Documente Academic
Documente Profesional
Documente Cultură
e-ISSN: 2278-2834,p- ISSN: 2278-8735.Volume 10, Issue 3, Ver. I (May - Jun.2015), PP 22-30
www.iosrjournals.org
M.Tech Student, Department of Electronics & Communication, Dayananda Sagar Institutions, India
2
Professor, Department of Electronics & Communication, Dayananda Sagar Institutions, India
Abstract :In todays modern internet era, Security is one of the important issue in the communication and
storage of images. In order to provide security for these images, a wide variety of techniques and proposals
have been developed all across the world. The most prominent technique among all those security schemes is
the Image steganography. It is simply defined as the art or science in which the image sender embeds some
secret information into the image and sends it across a channel to the receiver. On receiving the image at the
receiver end the information that is hidden inside the image is retrieved back. In this research, we have used
discrete wavelength transformation and modified AES techniques for the process of steganography. The wavelet
is applied to the cover image in order to produce four different sub bands of different frequencies like LL, LH,
HL and HH. The secret information is encrypted with the use of modified AES technique and it is hidden inside
the LH, HL and HH sub bands of the cover image. This novel algorithm for image steganography gives better
quality images and more security compared to other conventional methods that are present today.
Implementation of this steganography process is done using Beagle Board-XM with Open CV platform. Since
we are using Open CV and Beagle Board-XM for the purpose of implementation, the delay in processing of the
image, cost and resources required will be greatly reduced.
Keywords - Image Steganography, Discrete wavelet transformation, Biorthogonal DWT, AES, Encryption,
Beagle Board-XM, Open CV, PSNR
I.
Introduction
Since the inception of internet the security of information is the most vital factor in information
technology and communication. Many methods like cryptography, watermarking and encryption and decryption
techniques were developed in order to secure the information during communication. Unfortunately it was not
enough to protect the contents of the secret message from outside phishers and hackers. There was a need of a
new technique which can keep the existence of the message secret. The technique used to implement this is
called as Steganography.Coming to the history of Steganography, the Greek historian Herodotus writes in his
literary work Histories about a nobleman, Histaeus, who wanted to communicate with his son in law in
Greece. To communicate secretly with his son in law, he shaves one of his trusted slaves head and tattooed the
message on his scalp. After few months when the hair was grew on his scalp the slave was sent to Greece to
dispatch the secret message on his scalp [2]. As evidence, during world war the Germans developed a special
technique called as Microdot. Information such as important images and photographs were reduced in size
until it was a size of a sized period and were sent with a normal cover message over an insecure channel [3].
The major difference between Steganography and Cryptography is, Cryptography focuses only on
keeping the secret message or information and it is practically detectable. But in Steganography, it focuses on
keeping theexistence of the hidden information secret [4]. Compared to Cryptography, the steganography is
practically undetectable and more secure from external attackers. Both the techniques are unique in its own way
and have their own limitations and advantages. Once the presence of hidden secret is revealed or suspected the
security of the steganography fails. In few practical applications, the strength of steganography can be enhanced
by combining it with cryptography.
The other two techniques that are similar to steganography are watermarking and fingerprinting [5].
These two techniques mainly concentrate on protecting the intellectual property and have different algorithms
and requirements compared to steganography. In watermarking the instances that are present in the image are
marked in a uniform manner. A signature or sign are hidden in objects in a uniform manner in order to specify
the origin or signify the ownership and protection of copyright [6]. In fingerprinting, unique marks are
embedded well defined copies of the carrier object and then they are supplied to different customers. This
enables the intellectual property owner to identify if there is any break in licensing by the customers and supply
DOI: 10.9790/2834-10312230
www.iosrjournals.org
22 | Page
II.
Related Work
Po-Yueh Chen and Hung-Ju Lin., [7] have effectively worked on a DWT based methodology for image
steganography. They have developed a new technique in which the secret message can be embedded in a
frequency domain. The new algorithm has been divided into two modes and five cases in their novel approach
for steganography. In this approach they have the secret information are embedded in the high frequency
coefficients which are resulted from the discrete wavelet transformation. Image quality is improved by
preserving the low frequency coefficients without making any modifications.
Mohammad Ali Mahrabi et al., [8] has done a remarkable work on steganalysis which are based on
statistical moments of wavelet sub band histograms. The wavelet sub bands which are derived from an image
consist of both least and most significant bits. Some of the least significant bits from grey level and some most
significant bit planes are removed and the image is decomposed using 3 levels Haar DWT. This decomposition
of image by 3 levels Haar DWT gives 13 sub bands in which the image itself is considered as LL band and
Fourier transform of each histogram sub band is calculated separately. This work gives improved detection rate
for LSB steganography compared to other techniques that are present today.
Prof U.L.Kulkarni et al., [9] has done a significant work on steganography using biometrics. Skin tone
region of images has been considered in their work to carry out the steganography using biometrics. They have
hidden the secret information in the skin tone region which is statistically undetectable compared to other
regions. The skin tone detection is performed by HSV color space. The secret information is hidden using DWT
approach which is more efficient that other frequency domain approaches. This work gives an insight into object
oriented steganography which illustrates higher security compared to other conventional methodologies.
Wang Yan and Ling-Di Ping., [10] has done an in depth study on steganography techniques and has
found a new algorithm which is based on spatial domain. They have formulated a new algorithm from which we
can hide a large amount of secret information in BMP image. They have used a methodology called as fixed
LSBs substitute method which will compensate for distortion. This proposed method gives high capacity and
good quality of images compared to other steganography techniques that are in the present day.
K. Kanimozhi et al., [11] has performed a steganography based on dual transform using wavelets by
statistical methodology. This method extracts either DWT or IWT coefficients of both cover and secret image.
Fusion processing techniques is used on the coefficients that are extracted and stego image is obtained by the
application of various combinations of DWT and IWT on cover and secret images. Visual effect and robustness
DOI: 10.9790/2834-10312230
www.iosrjournals.org
23 | Page
III.
The commonly used definitions and general block diagram of Image steganography are discussed here.
B. Definitions
Cover Image: It is an object which contains stream of data or signals which is used as a carrier of the
embedded information. The important factor of this cover image is the amount of secret information that
can be embedded into it.
Payload Image: It is the image that is used to embed into the cover image as secret information.
Stego Image: It is image that is obtained after the unification of cover image and payload image.
Capacity: It is defined as the amount of secret information that can be hidden inside the cover image
without harming the properties of the cover image.
Security: It is the measure of protection of payload image that is hidden inside the cover image.
C. General Block Diagram of Image Steganography
DOI: 10.9790/2834-10312230
www.iosrjournals.org
24 | Page
DWT (j,k) =
(1)
(2)
Prediction: In this step, the predicted values are obtained using the equation (3).
(3)
Updation: In this step, the updated values are obtained by the equation (4).
(4)
DOI: 10.9790/2834-10312230
www.iosrjournals.org
25 | Page
V.
The stego image is obtained by embedding the payload image into the cover image by the
steganographic technique. We make a few assumptions like the cover and payload images are color images with
different dimensions and there is a proper channel for the transmission of stego image. The objectives of this
algorithm include improving the PSNR value and increasing security. The embedding algorithm is shown in
Fig.6 and Table I respectively and reconstruction algorithm is shown in Fig.7 and Table II. Implementation of
this image steganography is done using Beagle Board-XM with OpenCV-2.4.2 platform. Beagle board is a low
cost and low power hardware which has several facilities like 512MB RAM, USB ports, Ethernet ports and
memory card slots to store images. Implementation of steganography on Beagle Board helps it in the usage of
real time applications. Since we are using OpenCV platform to implement this, the cost of the resources are
greatly reduced and the speed of operation is improved drastically. Microsoft Visual studio Express 2012 for
Windows Desktop is used to cross check the results of PSNR and capacity values that are obtained in the
steganographic process.
DOI: 10.9790/2834-10312230
www.iosrjournals.org
26 | Page
DOI: 10.9790/2834-10312230
www.iosrjournals.org
27 | Page
VI.
Performance Analysis
The performance parameters that are considered here are PSNR value and capacity of the image. The PSNR
value of any image can be found by using the expression (5).
(5)
Where MSE = /( )
The cover images and the payload image that are used for the performance analysis is as shown in Fig.
8, Fig. 9, Fig. 10, Fig. 11, Fig.12 and Fig. 13. At first, we have used a constant cover image of 512 x 512
dimensions and payload image of different dimensions in order to analyze the results. The PSNR values for
different capacity using Biorthogonal DWT and Modified AES are tabulated in the Table III.
Similarly in the next stage we have used constant payload image of 256 x 256 dimensions and different
cover images of 512 x 512 dimensions to see the variations in PSNR values. It is noted that the PSNR values
slightly changes with the use of different cover images. The PSNR values are tabulated in Table IV. The PSNR
values that are obtained from the proposed algorithm are compared with other existing steganographic
techniques presented by Mohammad Reza Dastjani [15], Wang Yan [11], Kannimozhi [12], and Neha Gupta
[13]. It is observed that the PSNR value obtained in our proposed algorithm is much better compared to the
values obtained in other technologies. The comparison table of PSNR values is shown in Table V and the
screenshot obtained in Microsoft Visual studio Express 2012 during steganography process is given in Fig. 10.
TABLE III. PSNR Values for different capacity
Payload Image Size
256*256
400*400
450*450
470*470
Capacity
0.2500
0.6103
0.7724
0.8426
PSNR
49.1819
49.1704
49.1758
49.1623
From the above table consisting of variations in PSNR values corresponding to different capacity it can be
observed that as the capacity is increased the value of PSNR decreases.
Fig. 8. Cover Image: asheyes.jpgFig. 9. Cover Image: hfingers.jpg Fig. 10. Cover Image: dhands.jpg
(512 x 512) (512 x 512) (512 x 512)
DOI: 10.9790/2834-10312230
www.iosrjournals.org
28 | Page
Fig. 11. Cover Image: sfeet.jpgFig. 12. Cover Image: jears.jpg Fig. 13. Payload: navi4.jpg
(512 x 512)(512 x 512)
(Different Sizes)
TABLE IV. PSNR values for different Cover Images
Cover Images
hfingers.jpg (512 x 512)
dhands.jpg (512 x 512)
sfeet.jpg (512 x 512)
jears.jpg (512 x 512)
Capacity
0.250000
0.250000
0.250000
0.250000
PSNR value
49.1956
49.1616
49.1659
49.1527
Proposed Technique
2D Haar DWT
Spatial Domain
Coefficients
1D Haar DWT
Biorthogonal+MAES
PSNR value
25.176
41.411
40.850
41.220
49.181
Fig. 10. Screenshot of steganography process in Ubuntu using OpenCV and Beagle Board-XM
VII.
Conclusion
A secret data that has to be hidden and sent from the sender to receiver end is done by carefully hiding
the data inside a stego image. A secure channel is used for the transformation of this stego image from one end
to the other. The embedded data inside the stego image is highly secure because of the encryption done by the
method of modified advanced encryption technique and Biorthogonal DWT for the creation of sub bands. The
implementation of this complete steganographic process is done by using Open CV platform and Beagle BoardXM. Applications of this image steganography include major e-commerce industries and military fields. Future
work includes usage of other complex encryption techniques and wavelet transformations for better accuracy
and security.
DOI: 10.9790/2834-10312230
www.iosrjournals.org
29 | Page
References
[1].
[2].
[3].
[4].
[5].
[6].
[7].
[8].
[9].
[10].
[11].
[12].
[13].
[14].
[15].
T. Moerland, Steganography and Steganalysis, Leiden Institute of Advanced Computing Science, www.liacs.nl/home/tmoerl/privtech.pdf
J. Silman, Steganography and Steganalysis: An overview, Sans Institute, 2001.
T. Jamil, Steganography: The art of hiding information is plain sight, IEEE Potentials, 18:01, 1999.
H. Wang and S. Wang, Cyber Warfare: Steganography vs Steganalysis, Communications of the acm, 47:10, October 2004.
R.J. Anderson and F.A.P. Petitcolas, On the limits of Steganography, IEEE Journal of selected areas in communications, Ma y 1998.
L.M. Marvel, C.G. Jr Boncelet and C. Retter, Spread Spectrum Steganography, IEEE Transactions on image processing, 8:08,1999.
Po-Yueh Chen and Hung-Ju Lin, A DWT based approach for image steganography, International Journal of Applied Science and
Engineering, 2009.
Mohammad Ali, Mehrabi, Hassan Aghaeinia and Mojtaba Abolghasemi, Image Steganalysis based on statistical moments of wavelet
subband histogram of images with least significant bit planes, Congress on Image and Signal Processing, 2008.
Professor U.L. Kulkarni and Andaljali A Shejul, A DWT based approach for Steganography using Biometrics, International Conference
on Data Storage and Data Engineering, June 2010.
Wangyan and Ling-Di Ping, A new Steganography algorithm based on Spatial Domain, International Journal of Symposium on
Information Science and Engineering, Volume 3, Issue 1, pp. 408-411, January 2013.
K Kanimozhi, G. Prabakaran and Dr. R. Bhavani, Dual Transform Based Steganography Using Wavelet Families and Statistical Methods
International Conference on Pattern Recognition, Informatics and Mobile Engineering (PRIME), 2013.
Neha Gupta and Nidhi Sharma, DWT and LSB based Audio Steganography, International Conference on Reliability, Optimization a nd
Information Technology-ICROIT, February 2014.
Prabakaran. G and Bhavani.R, A Modified Secure Digital Image Steganography Based on Discrete Wavelet Transform, International
Conference on Computing, Electronics and Electrical Technologies [ICCEET] ,2012.
John Daemen and Vincent Rijmen, The design of Rijndael: AES-The Advanced Encryption Standard,Springer 2002, ISBN: 3-54042580-2.
Mohammad Reza Dastjani and Farahani Andali Pourmohammad, A DWT based perfect secure and high capacity Image Steganography
method, International Conference on Parallel and Distributed Computing, Applications and Technologies, 2013.
Author Biographies
Dr. Manjunath H Vreceived his Bachelors of Engineering from Mysore University and completed his Masters
of Science (Engineering) and Doctor of Philosophy degrees from the reputed Indian
Institute of Science (IISc), Bangalore, in the field of Power Electronics and drives. He has
more than 32 years of experience in the field of Electrical Engineering and has worked in
numerous educational and research institutes globally. With his unique nature of discipline
and conduct he has contributed enormously in the field of teaching and remains as a
motivation for hundreds of students. He has worked in many topnotch research projects and
has published more than 20 innovative papers in International Conferences and has 5
globally accepted papers in reputed International Journals. Currently he is working as a
senior professor in the department of Electronics and Communication, Dayananda Sagar College of
Engineering, India. Contact: hvmanju4655@yahoo.co.in
Nagarjun B received his Bachelors of Engineering in the field of Electronics and Communication in the year
2013 from Visvesvaraya Technological University. He started pursuing his Masters of
Technology in the field of VLSI and Embedded Systems from the year 2013-2015. He has
worked on several research projects and was among the first 51 participants from India to
complete the Semiconductor Manufacturing Course from Indian Institute of Technology
(IIT-Bombay) in the year 2012. His keen interest towards technology has driven him to
participate in 4 National/International Workshops and 3 International conferences across the
country. He has presented papers in 3 National conferences and possesses 2 globally
accepted papers in International Journals. He is also a member of International Association
of Engineers &Universal Association of Computers and Electronics Engineers. Currently he is working towards
his masters degree in VLSI and Embedded systems from Dayananda Sagar College of Engineering, India.
Contact: nagarjun9995@gmail.com
DOI: 10.9790/2834-10312230
www.iosrjournals.org
30 | Page